Skip to content

Commit e49de1a

Browse files
committed
remove articles
1 parent 163318d commit e49de1a

1 file changed

Lines changed: 100 additions & 0 deletions

File tree

Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
# AADSTS650056: Misconfigured application error
2+
3+
# AADSTS650056: Misconfigured application error
4+
5+
This article provides troubleshooting steps and solutions for the error message AADSTS650056: Misconfigured application. This error typically occurs when there are issues with permissions or consent configurations in an Azure Active Directory (Azure AD) application.
6+
7+
## Symptoms
8+
9+
When attempting to sign in to an application, you might encounter the following error message (or a similar message):
10+
11+
AADSTS650056: Misconfigured application. This could be due to one of the following:
12+
- The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client’s application registration.
13+
- The admin has not consented in the tenant.
14+
- Check the application identifier in the request to ensure it matches the configured client application identifier.Please contact your admin to fix the configuration or consent on behalf of the tenant.
15+
16+
## Cause
17+
18+
This error usually occurs due to one of the following reasons:
19+
- The application does not have the required permissions configured in its Azure AD registration.
20+
- The admin has not consented to the permissions for the application on behalf of the tenant.
21+
- The application identifier specified in the request does not match the registered application identifier in Azure AD.
22+
23+
## Solution 1: Verify application permissions and consent (for application owners)
24+
25+
If your organization owns the application (i.e., the application registration is in your organization's Azure tenant), follow these steps:
26+
1. Ensure that the application has at least the **User.Read** or **openid** delegated permission from **Microsoft Graph** added in its **API Permissions**.
27+
2. Check the **Status** column under **API Permissions** in the application's registration to verify whether the permissions are consented to. For example:
28+
- If the permission is not consented to, it will appear as pending.
29+
- If successfully consented, it will appear as "Granted for [Tenant Name]".
30+
31+
Example of a consented permission:
32+
33+
:::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650052.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650052.png":::
34+
3. If the application is designed as a multi-tenant application, include the **User.Read** delegated permission in addition to other required permissions to simplify the consent process for customers.
35+
4. If the application appears in **App registrations** in Azure AD, ensure it is properly configured and consented to. Note: Do not confuse this with **Enterprise applications**.
36+
37+
If the issue persists, you may need to generate a manual consent URL (refer to the "Manually build the consent URL" section below).
38+
39+
## Solution 2: Admin consent for third-party applications
40+
41+
If your organization is using the application as a third-party application (i.e., your organization is not the application owner), follow these steps:
42+
1. As the Global Administrator or Company Administrator, attempt to sign in to the application. You should see a consent screen prompting you to grant permissions. Ensure you check the box for **"Consent on behalf of your organization"** before proceeding.
43+
44+
Example of the consent screen:
45+
:::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650053.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650053.png":::
46+
2. If you do not see the consent screen, delete the application from the **Enterprise applications** section in Azure AD and try signing in again.
47+
48+
If the error persists, proceed to the next solution.
49+
50+
## Solution 3: Manually build the consent URL
51+
52+
In some scenarios, you may need to manually generate a consent URL to grant permissions to the application. This is especially useful when the application is accessing specific resources that require custom configurations.
53+
54+
### For the authorization V1 endpoint:
55+
56+
The consent URL will look like this:
57+
58+
https://login.microsoftonline.com/{Tenant-Id}/oauth2/authorize
59+
?response\_type=code
60+
&client\_id={App-Id}
61+
&resource={App-Uri-Id}
62+
&scope=openid
63+
&prompt=consent
64+
65+
For example:
66+
67+
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize
68+
?response\_type=code
69+
&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
70+
&resource=https://vault.azure.net/
71+
&scope=openid
72+
&prompt=consent
73+
74+
### For the authorization V2 endpoint:
75+
76+
The consent URL will look like this:
77+
78+
https://login.microsoftonline.com/{Tenant-Id}/oauth2/v2.0/authorize
79+
?response\_type=code
80+
&client\_id={App-Id}
81+
&scope=openid+{App-Uri-Id}/{Scope-Name}
82+
&prompt=consent
83+
84+
For example:
85+
86+
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize
87+
?response\_type=code
88+
&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
89+
&scope=openid+https://vault.azure.net/user\_impersonation
90+
&prompt=consent
91+
92+
### Notes:
93+
- If the application is accessing itself as the resource, the **{App-Id}** and **{App-Uri-Id}** will be the same.
94+
- Obtain the **{App-Id}** and **{App-Uri-Id}** from the application owner.
95+
- The **{Tenant-Id}** corresponds to your tenant identifier, which can be either your domain (e.g., yourdomain.onmicrosoft.com) or your directory ID.
96+
97+
Example of a tenant identifier:
98+
:::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650054.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650054.png":::
99+
100+
By following these steps, you can resolve the AADSTS650056: Misconfigured application error. If the issue persists, contact your application owner or Azure AD administrator for further assistance.

0 commit comments

Comments
 (0)